Recent Posts

Responsive Ads Here

Monday, 19 October 2015

Java Projects Titles

                               
  1. Speech comparison using neural networks
  2. IRIS Recognition Java / Matlab
  3. ICS (Inventory Control System)
  4. Home Automation System with Speech Recognition Java / Hardware
  5. Total Business Solution Java / SQL
  6. Membership Management using Java Card Java / Java Card reader
  7. Online Ticket Reservation System JSP / SQL
  8. Voice/ Speech based Browser Java
  9. Smart Encryption (Image/ audio / video) Java
  10. Java Editor Java
  11. Visual Lab - electronic circuit designing simulation. Java
  12. CASE tools- Computer Aided Software Engineering Java
  13. Mobile- Commerce / CRM JSP / Servlet / SQL
  14. Mobile- Online Examination Sysetm jsp / Servlet / J2ME
  15. Simulator 8085 Java
  16. Text based Image search in Database Java / Matlab
  17. Multi Player Tetris game wih AI Java / AI
  18. Bomber Man with AI Java / AI
  19. X & 0 game Java / AI
  20. Minesweeper game for Mobile with AI J2me / Java
  21. Remote Desktop Java
  22. Download Manager (ftp) Java
  23. Network Health/Node monitoring [Six SigmaImplementation]Java / SQL
  24. Distributed mobility management for target tracking in mobile sensor networks Java / J2ee
  25. Mobile Banking J2me / Servlet
  26. Multicast Server Chat Java
  27. Mobile Screen Info Generator JSP / Servlet
  28. Dairy Management System Java
  29. Terminal Controller Java
  30. Tour & Travel Mgmt application Java
  31. Java Media Player Java
  32. Digital Image Watermarking Java
  33. TTS (text to speech ) Application Java
  34. Speech Enabled Database Operations Java / SQL
  35. Distributed Banking System Java / SQL
  36. Portfolio Management Java / JSP / SQL
  37. Network Monitoring Java
  38. Mobile Info Centre J2me / JSP
  39. Online Equity Management J2me / JSP
  40. Multi player Chess Java/ J2me
  41. Dynamic load balancing in distributed systems Java
  42. Multicast routing with delay for apps. on overlay networks Java
  43. Packet reordering in transmission control protocol Java
  44. Distributed database architecture Java
  45. Efficient query processing in peer-to peer networks Java
  46. A grid-powered framework for distributed programming Java
  47. Face recognition using laplacian faces Java
  48. Noise reduction by image filtering Java
  49. handwritten script recognition Java
  50. Messaging service over TCP/ IP in local area network Java
  51. Retrieving files using content based search Java
  52. Resource management system (RMS) Java / SQL
  53. E-auction bidding and winning JSP / SQL
  54. Online examination system JSP / Servlet / SQL
  55. Global job portal management JSP / Servlet / SQL
  56. On-line mobile voting J2me / Servlet / SQL
  57. Xml enabled cross data migration Java
  58. Mobile to PC communication J2ME
  59. Mobile Messenger for Ad-Hoc Networks J2ME

  60. Character Recognition System Java
  61. Intrusion Detection System / Firewall Java
  62. Desktop Payroll Application Java / SQL
  63. Windows Desktop Search Java
  64. Securing TCP/IP communication using cryptography Java
  65. Implementation of Digital image processing techniques Java
  66.  A Secure Cloud Server System using Proxy Re-Encryption Model.
  67. A Secure payment System for banking transactions.
  68.  An efficient Mailing System for Detecting Spam Mails.
  69. An enhanced model for achieving high throughput using variant buffer size methodology.
  70.  Anomaly based intrusion detection system.
  71. Automatic Testing System for Web Application.
  72. Automatic Vehicle Detection in Surveillance Video.
  73.  Bandwidth estimation systems in networks.
  74. Blocking intruders for secured network maintenance.
  75. Boolean Retrieval for Medical datas.
  76. Caching techniques in MANET and various routing protocols in MANET.
  77.  Capacity of Data Collection in Arbitrary Wireless sensor networks.
  78. CFR: an efficient congestion free router.
  79. Channel allocation system in mobile networks.
  80.  Cloud Data Protection for the Masses.
  81.  Coding for cryptographic security enhancement using stopping sets.
  82.  Content based image retrieval system.
  83. Continuous query processing system for location based services.
  84.  Cooperative Secure Multi-Cloud Verification System.
  85.  Credit card fraud detection system using genetic algorithm.
  86. Crime Detection in Credit Card Fraud.
  87. Criminal Face Detection.
  88.  Cut detection in Wireless Sensor Network.
  89. Data embedding using Pixel-pair matching technique.
  90.  Data Transmission Using Multi-Tasking-Sockets.
  91. Decision trees for uncertain data.
  92. Detecting Complaints in Online Product Purchase.
  93.  Digital image processing filters for image filtering methods.
  94.  Distributed data integration on electricity board.
  95.  Dynamic Resource allocation in Cloud.
  96. Efficient and Dynamic Routing Topology Inference.
  97. Efficient and secure search on encrypted medical data.
  98. Efficient load balancing system in SIP Servers.
  99. Efficient load distribution scheme to avoid congestion in servers.
  100. Efficient search on XML data.
  101. Efficient searching technique in xml data.
  102. Efficient steganography embedding methodology for secret data preservation.
  103. E-Fraud Prevention based on the Self-Authentication of e-Documents.
  104. FEC based cryptography for secured data communication.
  105. Finding File Duplication.
  106. Finding latency in data transmission.
  107. Geometric Routing Protocol in MANET.
  108. Get your Campus.
  109. Handwritten Chinese Character Recognition.
  110. High efficient location monitoring system.
  111. Homophonic cryptography technique for data security.
  112. Hop-by-Hop routing in Wireless Network.
  113. Impact of denial of service attacks on servers.
  114. Information leak detection and prevention system.
  115. Intrusion detection system in wireless sensor networks.
  116. IPTV Portal System.
  117. License Plate Recognition System.
  118. Mobile alert based intruder blocking system in cloud computing.
  119. Mobility management schemes in wireless networks using agent forwarding methods.
  120. Monitoring cloud resources for better resource utilization.
  121. Multi-Cloud System to avoid server failures.
  122. Optimized Software Release Planner.
  123. Packet monitoring based multicasting system.
  124. Personalized Image Search System.
  125. Portable Cloud System.
  126. Preventing attackers in WSN from collecting datas.
  127. Preventing Intrusion in Web and Database Servers.
  128. Project Management System.
  129. Protecting location information in Wireless Sensor Network.
  130. PUBMED: an efficient biomedical based hierarchical search engine.
  131. Puzzle based secure data transmission scheme to avoid intruders.
  132. Ranking and feedback model in search engines.
  133. Ranking system for web library.
  134. Recovery from link failure in wireless networks.
  135. Reducing noises in images.
  136. Reducing the costly forward using band-based directional broadcast.
  137. Reducing the number of transmission in Wireless Networks.
  138. Routing in Wireless Adhoc Network.
  139. Scalable and Secure Sharing of Personal Health Records.
  140. Secure Access Control System in Cloud using Attribute based encryption technique.
  141. Secure and efficient video distribution scheme using variant bandwidth system.
  142. Secure and practical outsourcing of linear programming in cloud computing.
  143. Secure cloud access system using JAR.
  144. Secure communication by hiding packets in intermediate router system.
  145. Secure Content Distribution using Network Coding Algorithm.
  146. Secure Overlay Cloud Storage with Access Control.
  147. Secure personal information system in Medical System.
  148. Secured data communication system in wireless mesh networks.
  149. Security Enhanced Facebook.
  150. Security key based Video Uploading and viewing System.
  151. Self diagnosing with identifying disease treatment with online doctor precautionary.
  152. Selfish overlay network creation and maintenance.
  153. Single-source shortest path algorithm with nonnegative edge path.
  154. Student Management System.
  155. Supporting data transfer and movements of mobile terminal between different locations.
  156. Ticket based secured mobile banking scheme for detecting frauds.
  157. Ticket based security system for banking applications.
  158. Trace back scheme on finding attackers in Routing.
  159. Traffic flow analysis system based on a novel concept of flow set.
  160. Trust aware routing in MANET.
  161. Vertical Search Engine.
  162. Video steganography for secure data preservation.
  163. Virus Spread in Network.
  164. Virus spread in P2P network.
  165. Visual cryptography system for secret image sharing


No comments:

Post a Comment